When reading these articles focus on the thesis and findings, some of them use pretty esoteric statistics and this isn't a Ph.D. seminar so I'm not going to focus on that and you shouldn't either.
Information Security and Sarbanes-Oxley Compliance: An Exploratory Study (Wallace, 2011)
THE CONSEQUENCES OF INFORMATION TECHNOLOGY CONTROL WEAKNESSES ON MANAGEMENTINFORMATION SYSTEMS: THE CASE OF SARBANES-OXLEY INTERNAL CONTROL REPORTS. (Li, Peters, Richardson,Weidenmier, 2012)
- This is the seminal article explaining public/private key encryptions, it's a bit technical so just scan it and don't worry about the math but try to understand it conceptually.
Security by Obscurity(Bruce Schneier, May 15, 2012 - Now referred to as Obscurity is no Security)
Threat Environment:
Table of Contents
Threat Environment (Optional):
Aaron Swartz:
IT Controls and SOX Readings:
When reading these articles focus on the thesis and findings, some of them use pretty esoteric statistics and this isn't a Ph.D. seminar so I'm not going to focus on that and you shouldn't either.Optional Additional Readings:
Cryptography Readings:
Digital Certificates and Certificate Authority Readings:
(Public/Private Key)
Password Readings:
Password Vulnerabilities:
Storing Passwords:
Password Usage:
Why do we keep making the same password mistakes?:
New Kinds of Authentication/Better Passwords:
How Many Logins/Unique:
Software Security Readings:
Incident Response Readings:
SEC Readings: